Basic knowledge of VPN

2010-12-14  来源:本站原创  分类:Internet  人气:81 

First, what is VPN?
Through the network data packets and encrypted transmission of private data transmission in the public network to reach the level of security of private networks, which use the public network and build Virtal Private Network (or VPN). If the access mode for the dial-up, then called the VPDN.
IP VPN network established through public private data transmission channel, to remote branch offices, business partners, and other mobile workers connected. Reduce the burden of the enterprise remote access costs, save on phone costs and expenses, and provides a secure end to end data communications.
For many people, often heard the VPN, but do not know what VPN. VPN's English name is "Virtual Private Network", translates to "virtual private network." As the name implies, the virtual private network we can understand it as a virtual enterprise out of line. It can be encrypted by a special protocol on the connection in the Internet two or more different places within the enterprise to build a proprietary network of communication between the lines, is like a special line set up the same, but it does not the laying of cables needed to really like the physical line. This is like the bureau to apply for green, but do not give the cost of laying lines, do not buy a router and other hardware devices. VPN technology has an important technology was originally one of the router, the current switch, firewall software such as equipment or WINDOWS2000 also supports VPN functionality in a word, VPN's core is in the use of public networks to create a virtual private network. The emergence of VPN to solve the enterprises are facing a major problem, how to invest in the limited network conditions and management tools to provide high network performance. With public network service platform, VPN can provide cheap and extensive communication; same time, through the introduction of various security technologies, can guarantee the security of communications. As originally designed, VPN both the public and private networks in a number of advantages, the public network, low price, rich features and high-performance private network, combined with high security, a private network build a line of business effective solution. VPN services can significantly reduce the network as a cost, reducing the burden on enterprises to improve network efficiency and effective method to gradually replace the use of green building enterprise private network with traditional practices.

Second, VPN's classification? (VPN into which categories? VPN which can be divided into several categories?)
There are three VPN solutions, users can choose according to their own situation. These three solutions are: remote access Virtual Private Network (AccessVPN), the internal virtual network (IntranetVPN) and the extended virtual enterprise network (ExtranetVPN), respectively, these three types of VPN remote access network with the traditional, internal Intranet and enterprise networks and relevant partners in the enterprise network should be composed of relatively Extranet.
Access VPN
Ideal for mobile workers within the company often have a remote office situation. Business employees use VPN services provided by local ISP to connect, and the company's VPN gateway to establish a private tunnel connection. RADIUS server can authenticate and authorize staff to ensure the security of the connection at the same time greatly reduce the burden of telephone charges.
Intranet VPN
More and more companies need to be established within the country and the world a variety of offices, branch offices, research institutes, the various branches of the network connection between the traditional leased line generally. Obviously, an increase in branch offices, business development more widely, the network structure become more complex and costly. Using VPN feature set in the Internet, the worldwide Intranet VPN. Using Internet line to ensure network connectivity, and the tunnel, encryption and other VPN feature can ensure that information on the entire Intranet VPN secure transmission. Intranet VPN connection through a dedicated shared use of infrastructure, connecting corporate headquarters, remote offices and branches. Enterprises have the same policy with the private network, including security, quality of service (QoS), manageability and reliability.
Extranet VPN
With the information age, companies dealing with all kinds of information more and more attention. Hope that we can provide customers with the most efficient and convenient information services, through a variety of ways to understand customer needs, and cooperation between various enterprises, more and more, more frequent exchange of information. Internet for such a trend to provide a good foundation, and how to use the Internet for effective information management, enterprise development is a key issue in the inevitable. Using VPN technology can build secure Extranet, both to customers and partners to provide effective information services, can guarantee the security of its own internal network.

Third, VPN's role? VPN can bring us what kind of benefits?
First, it can reduce the cost of the user's network: Users only need to apply for a local ISP operators, cheap and efficient ADSL line will be able to create a common internal private network, not only communication costs than the traditional green way to apply to the telecommunications sector, significantly reduced; Second, enterprises can purchase and maintenance of communications equipment to save money.
VPN platform also can be resolved through the leadership of the company when the mobile office with the internal data exchange network in the same VPN access network with different partners, you can set different permissions they have, and then ensure that important information safe and convenient internal management .
Finally, because the VPN is encrypted, so it is safe IP address, VPN data packets in transmission in the Internet, Internet users to only see on the IP address of the public can not see the information contained in the real IP, so remote the address specified on the private network is protected.

Fourth, SSL VPN What is it?
What is SSL VPN? So to speak, SSL is the Internet, the most widely used security protocols. SSL protocol provides data privacy, endpoint authentication, message integrity and other characteristics. SSL protocol consists of many sub-agreement, of which two major sub-agreement handshake protocol and recording agreements. Handshake protocol allows the server and client "in the application protocol to transmit the first data byte before each confirmation, negotiation of a key encryption algorithm and password." During data transfer, recording protocol handshake protocol using encryption and decryption keys generated by subsequent exchange of data.
SSL independent of the application, so any application can enjoy it without regard to the security of the implementation details.
SSL exposure to network system between the transport layer and application layer. In addition, SSL itself is almost all Web browsers. This means that clients do not need to support SSL connections to install additional software. These two features can be used in SSL VPN is the key point.

Fifth, the hardware and software VPN VPN VPN comparison of the areas in which, has long been the battle for software and hardware. Supporters criticized the hardware firewall software products have problems in the security; and software firewall's supporters believe that the use of hardware products and upgrades in the very inconvenient.

VPN software programs to implement the advantages and features:

Pure software VPN products, protection of existing investments, without adding any hardware; no need to change existing applications and network architecture, to ensure the normal operation of businesses affected; support a variety of access methods (using ADSL, broadband Internet access method is more effective good), do not need to pull the DDN line or apply for a fixed IP, dynamic IP addressing to support both ends, for enterprises to save a lot of communication costs; network platform adaptability, scalability, and supports any C / S, B / S structure software; economic efficiency, easy to use, no professional maintenance; using advanced encryption algorithms to prevent data from being qie ting and tampering. Certification and authentication by password access hardware bundled access authentication, in addition to the password is correct, it must also be authorized based hardware to access. Or know the password to prevent unauthorized users access to corporate networks resignation of employees.

Hardware VPN solutions to implement the advantages and features:

Transmission mechanism as VPN encryption needs to consume system resources and affect network performance, and hardware VPN encryption and decryption will be referred to a special high-speed hardware processing, providing better performance and can provide a strong physical and logical security, and better to prevent illegal invasion, but also more simple configuration and operation. In general, the higher cost of hardware programs. However, if the network is small, selection for small and medium enterprises or small office VPN products is still very cost-effective. More products such as integrated firewall, VPN, VPN Router, cost is very high, and supports a variety of broadband access, it also provides convenient management tools to support mainstream VPN protocols, such as NETGEAR FVL328, NetScreen-50, Vigor 2300 and so on. Many VPN products also support dynamic IP address access, the ADSL connection with many small and medium enterprises, very useful.

相关文章
  • Basic knowledge of VPN 2010-12-14

    First, what is VPN? Through the network data packets and encrypted transmission of private data transmission in the public network to reach the level of security of private networks, which use the public network and build Virtal Private Network (or V

  • Basic knowledge of CSS 2009-03-13

    In this paper, the source for the original http://www.blueidea.com/tech/site/2006/3358.asp Near the time for the preparation of CSS Reference Manual First, with regard to CSS style sheets 1. In the study before css What you should master the basic kn

  • Basic knowledge of learning 2009-07-10

    Learning to learn Java first line j2se To learn j2ee must first learn j2se, just beginning to learn is not recommended to use j2se first IDE, then gradually transition to the use of the IDE development, after all, why use it conveniently. J2se study

  • Basic knowledge of JAVA-related 2009-11-14

    Basic knowledge of JAVA-related 1, object-oriented aspects of the characteristics of which 1. Abstract: Abstract is that it has overlooked a theme has nothing to do with the current objectives of those aspects in order to more fully with the current

  • Basic knowledge JAVA 2010-03-27

    Basic knowledge JAVA 1, object-oriented features are what 1. Abstract: Abstract is to overlook a topic unrelated to the current target those aspects in order to more fully pay attention to related aspects of the current target. Abstract did not inten

  • Summarize the essence of basic knowledge of JAVA 2010-04-13

    Summarize the essence of basic knowledge of JAVA 1, object initialization (1) non-static object initialization Created object, the object where the class members of all the data will first be initialized. Basic types: int type, initialized to 0. If t

  • Reposted elsewhere: J2ME basic knowledge of the characteristics of a 2010-04-14

    1, J2ME Java basic knowledge required in Most people now are starting from scratch learning J2ME, J2ME's time to learn, always from the foundation to start learning Java, and now books about Java-based foundation are based on J2SE speaking, which led

  • Some basic knowledge of linux (non-command) 2010-05-09

    1. First of all, talk about the version of linux, generally refers to kernel version, which is the version of the kernel General representation is: rxy, such as 2.0.33 2.2.3927 Represent the corresponding mean release version; x even on behalf of sta

  • Basic knowledge of a database 2010-05-09

    I. Brief history of the database: Database technology from birth to now, in less than half a century, formed a solid theoretical foundation, mature commercial products and a wide range of applications, to attract more and more researchers to join. Th

  • Transfer: WAP WML development of entry and improve the basic knowledge of the language 2010-07-30

    The second part: WML basic concepts - WML basic knowledge of the language 2.3 WML basic knowledge of the language The previous section we introduced the basic structure of WML program, then we introduce the basics of WML languages, including WML char

  • Basic knowledge of Data Warehouse 2010-08-05

    Due to the need, recently worked on the database-related projects, for many do not understand, especially in some conceptual thing, I do not know what it is exactly known, however, here are some basic knowledge, to be a seal, and readers also shared.

  • Three-dimensional process / basic knowledge of game production 2010-08-25

    Furry / DDM Jun: Many flash3d beginners are drawn from the flash or graphic transition, three-dimensional aspects of common sense really understand very little, even every day people who play 3D games. While the information on the number of three-dim

  • sqlserver basic knowledge of large order 2010-09-07

    sqlserver basic knowledge of large order SQL-Structured Query Language - (Open the SQL service: net start mssqlserver) - (In the command line, type 'sqlwb' command to open the SQL Manager) - (If you want to perform more than one command, then press F

  • Basic knowledge of the character set 2010-12-26

    See a recent article on the Oracle character set, the basic knowledge of the character set to explain the good, is hereby extract. GB2312/GBK/GB18030 focus on the relationship between Referred to the database character set, first of all need some und

  • basic knowledge of linux 2011-05-04

    basic knowledge of linux Use linux more recently, the basics of the relevant record, memo. Copy: cp Into the directory: cd cd .. Create the file: mkdir Move files / rename: mv aaa.xx bbb.xx Extract war: jar-xvf xx.war: Extract: tar-xvf xx.tar Compres

  • [Transfer] on the accounts. Borrowings. Certificate. Set of books and other basic knowledge of essay 2011-05-13

    On accounts, loans, vouchers, set of books and other basic knowledge of the essay First, on the accounts 1. Coding accounts. Ministry of Finance issued a decade ago, the industry in recent years, accounting system and the enactment of the "enterprise

  • Basic knowledge of three-dimensional game production process 2011-03-02

    Many flash3d beginners are drawn from the flash or graphic transition, three-dimensional aspects of the knowledge of understanding very little indeed, even every day, people who play 3D games. Although these three-dimensional information on the numbe

  • [Turn] on the accounts. Borrowings. Credential. Set of books and other basic knowledge of the essay 2011-05-13

    On accounts, loans, certificates, and other basic knowledge of the short set of books First, on the accounts 1 accounts coding. Ministry of Finance issued a decade ago the industry in recent years, accounting system and the promulgation of the "enter

  • Basic knowledge of Analysis Services 2011-07-29

    Basic knowledge of Analysis Services - In-depth SQL Server 2008 In this section, we will introduce the architecture of Analysis Services, this architecture to create the SQLServer2005 and continuity in SQL Server 2008. We will also study some basic f

  • Ubuntu partition and hard disk partition file types, and basic knowledge of Linux partitions 2011-07-03

    Ubuntu hard disk partition used system, so I study and research the Ubuntu hard disk partition, where details of all hard disk partitions under Ubuntu applications, Ubuntu hopes to be useful hard disk partition contains a very good framework for tran